Biblio
Filters: Author is Miao Yingkai [Clear All Filters]
A Kind of Identity Authentication under Cloud Computing Environment. Intelligent Computation Technology and Automation (ICICTA), 2014 7th International Conference on. :12-15.
.
2014. An identity authentication scheme is proposed combining with biometric encryption, public key cryptography of homomorphism and predicate encryption technology under the cloud computing environment. Identity authentication scheme is proposed based on the voice and homomorphism technology. The scheme is divided into four stages, register and training template stage, voice login and authentication stage, authorization stage, and audit stage. The results prove the scheme has certain advantages in four aspects.